Vulnerability Name:

CVE-2004-0398 (CCN-16192)

Assigned:2004-05-19
Published:2004-05-19
Updated:2020-10-09
Summary:Heap-based buffer overflow in the ne_rfc1036_parse date parsing function for the neon library (libneon) 0.24.5 and earlier, as used by cadaver before 0.22, allows remote WebDAV servers to execute arbitrary code on the client.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-787
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: Full-Disclosure Mailing List, Wed May 19 2004 - 01:36:42 CDT
Advisory 06/2004: libneon date parsing vulnerability

Source: FULLDISC
Type: Broken Link
20040519 Advisory 06/2004: libneon date parsing vulnerability

Source: MITRE
Type: CNA
CVE-2004-0398

Source: CONECTIVA
Type: Broken Link
CLA-2004:841

Source: BUGTRAQ
Type: Third Party Advisory
20040519 Advisory 06/2004: libneon date parsing vulnerability

Source: BUGTRAQ
Type: Third Party Advisory
20040519 [OpenPKG-SA-2004.024] OpenPKG Security Advisory (neon)

Source: CCN
Type: RHSA-2004-191
cadaver security update

Source: CCN
Type: SA11638
Neon Date Parsing Heap Overflow Vulnerability

Source: SECUNIA
Type: Third Party Advisory
11638

Source: SECUNIA
Type: Third Party Advisory
11650

Source: SECUNIA
Type: Third Party Advisory
11673

Source: GENTOO
Type: Third Party Advisory
GLSA-200405-13

Source: GENTOO
Type: Third Party Advisory
GLSA-200405-15

Source: CCN
Type: CIAC Information Bulletin O-148
Linux Neon and Cadaver Buffer Overflow Vulnerability

Source: CIAC
Type: Broken Link
O-148

Source: DEBIAN
Type: Third Party Advisory
DSA-506

Source: DEBIAN
Type: Third Party Advisory
DSA-507

Source: DEBIAN
Type: DSA-506
neon -- buffer overflow

Source: DEBIAN
Type: DSA-507
cadaver -- buffer overflow

Source: CCN
Type: GLSA-200405-13
neon heap-based buffer overflow

Source: CCN
Type: GLSA-200405-15
cadaver heap-based buffer overflow

Source: CCN
Type: GLSA-200406-03
sitecopy: Multiple vulnerabilities in included libneon

Source: CCN
Type: GLSA 200405-13
neon heap-based buffer overflow

Source: CCN
Type: GLSA 200405-15
cadaver heap-based buffer overflow

Source: CCN
Type: Conectiva Linux Security Announcement CLA-2004:841
libneon

Source: MANDRAKE
Type: Third Party Advisory
MDKSA-2004:049

Source: CCN
Type: OpenPKG-SA-2004.024
neon

Source: OSVDB
Type: Broken Link
6302

Source: CCN
Type: OSVDB ID: 6302
cadaver libneon Date Parsing Overflow

Source: REDHAT
Type: Third Party Advisory
RHSA-2004:191

Source: BID
Type: Third Party Advisory, VDB Entry
10385

Source: CCN
Type: BID-10385
Neon WebDAV Client Library ne_rfc1036_parse Function Heap Overflow Vulnerability

Source: CCN
Type: BID-10869
Neon WebDAV Client Library Unspecified Vulnerability

Source: CCN
Type: neon Web page
neon HTTP and WebDAV client library

Source: FEDORA
Type: Broken Link
FEDORA-2004-1552

Source: XF
Type: Third Party Advisory, VDB Entry
neon-library-nerfc1036parse-bo(16192)

Source: XF
Type: UNKNOWN
neon-library-nerfc1036parse-bo(16192)

Source: SUSE
Type: SUSE-SA:2004:013
cvs: remote command execution

Source: SUSE
Type: SUSE-SA:2004:015
cvs: remote command execution

Source: SUSE
Type: SUSE-SA:2004:016
squid: remote system compromise

Source: SUSE
Type: SUSE-SA:2004:017
Linux Kernel: local denial-of-service attack

Source: SUSE
Type: SUSE-SA:2004:018
subversion: remote system compromise

Source: SUSE
Type: SUSE-SA:2004:019
dhcp-server: remote system compromise

Source: SUSE
Type: SUSE-SA:2004:020
kernel: local privilege escalation

Source: SUSE
Type: SUSE-SA:2004:021
php4 / mod_php4: remote code execution

Source: SUSE
Type: SUSE-SA:2004:022
samba: remote root compromise

Vulnerable Configuration:Configuration 1:
  • cpe:/a:webdav:cadaver:*:*:*:*:*:*:*:* (Version < 0.22.0)
  • OR cpe:/a:webdav:neon:*:*:*:*:*:*:*:* (Version <= 0.24.5)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20040398
    V
    CVE-2004-0398
    2015-11-16
    oval:org.debian:def:506
    V
    buffer overflow
    2004-05-19
    oval:org.debian:def:507
    V
    buffer overflow
    2004-05-19
    BACK
    webdav cadaver *
    webdav neon *
    debian debian linux 3.0